Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 02
Reversible steganographic method using SMVQ approach based on declustering
Information Sciences: an International Journal
Reversible hiding in DCT-based compressed images
Information Sciences: an International Journal
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
Bioinformatics
The upper and lower bounds of the information-hiding capacity of digital images
Information Sciences: an International Journal
Proceedings of the 10th ACM workshop on Multimedia and security
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
IH'04 Proceedings of the 6th international conference on Information Hiding
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
How realistic is photorealistic?
IEEE Transactions on Signal Processing
Spread spectrum image steganography
IEEE Transactions on Image Processing
Steganalysis using image quality metrics
IEEE Transactions on Image Processing
IEEE Transactions on Circuits and Systems for Video Technology
Revealing real quality of double compressed MP3 audio
Proceedings of the international conference on Multimedia
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Applying electromagnetism-like mechanism for feature selection
Information Sciences: an International Journal
Tabu search based multi-watermarks embedding algorithm with multiple description coding
Information Sciences: an International Journal
Derivative-based audio steganalysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
An intelligent chaotic embedding approach to enhance stego-image quality
Information Sciences: an International Journal
Novel robust image watermarking based on subsampling and DWT
Multimedia Tools and Applications
Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
Proceedings of the Twelfth International Workshop on Multimedia Data Mining
Identification of smartphone-image source and manipulation
IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
Information Sciences: an International Journal
Steganography content detection by means of feedforward neural network
International Journal of Innovative Computing and Applications
Hi-index | 0.07 |
Steganography secretly embeds additional information in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great. To combat the threat posed by steganography, steganalysis aims at the exposure of the stealthy communication. In this paper, a new scheme is proposed for steganalysis of JPEG images, which, being the most common image format, is believed to be widely used for steganography purposes as there are many free or commercial tools for producing steganography using JPEG covers. First, a recently proposed Markov approach [27] is expanded to the inter-block of the discrete cosine transform (DCT) and to the discrete wavelet transform (DWT). The features on the joint distributions of the transform coefficients and the features on the polynomial fitting errors of the histogram of the DCT coefficients are also extracted. All features are called original ExPanded Features (EPF). Next, the EPF features are extracted from the calibrated version; these are called reference EPF features. The difference between the original and the reference EPF features is calculated, and then the original EPF features and the difference are merged to form the feature vector for classification. To handle the large number of developed features, the feature selection method of support vector machine recursive feature elimination (SVM-RFE) and a method of multi-class support vector machine recursive feature elimination (MSVM-RFE) are used to select features for binary classification and multi-class classification, respectively. Finally, support vector machines are applied to the selected features for detecting stego-images. Experimental results show that, in comparison to the Markov approach [27], this new scheme remarkably improves the detection performance on several JPEG-based steganographic systems, including JPHS, CryptoBola, F5, Steghide, and Model based steganography.